A New Attack on the LEX Stream Cipher

被引:0
|
作者
Dunkelman, Orr [1 ]
Keller, Nathan [2 ]
机构
[1] Ecole Normale Super, CNRS, Dept Informat, INRIA, 45 Rue Ulm, F-75230 Paris, France
[2] Hebrew Univ Jerusalem, Elinstein Inst Math, Jerusalem 91904, Israel
来源
关键词
LEX; AES; stream cipher design;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In [6], Biryukov presented a new methodology of stream cipher design, called leak extraction. The stream cipher LEX, based on this methodology and on the AES block cipher, was selected to phase 3 of the eSTREAM competition. The suggested methodology seemed promising, and LEX, due to its elegance, simplicity and performance was expected to be selected to the eSTREAM portfolio. In this paper we present a key recovery attack on LEX. The attack requires about 2(36.3) bytes of key-stream produced by the same key (possibly under many different IVs), and retrieves the secret key in time of 2(112) simple operations. Following a preliminary version of our attack, LEX was discarded from the final portfolio of eSTREAM.
引用
收藏
页码:539 / +
页数:4
相关论文
共 50 条
  • [1] The design of a stream cipher LEX
    Biryukov, Alex
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 67 - 75
  • [2] Cryptanalysis of the Stream Cipher LEX
    Dunkelman, Orr
    Keller, Nathan
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (03) : 357 - 373
  • [3] Cryptanalysis of the Stream Cipher LEX
    Orr Dunkelman
    Nathan Keller
    [J]. Designs, Codes and Cryptography, 2013, 67 : 357 - 373
  • [4] Research on the Randomness of Stream Cipher Algorithm LEX
    Deng, Yuanqing
    Shi, Hui
    Li, Guanlin
    Lai, Tianxing
    Zhao, Yazhou
    Gong, Jing
    [J]. INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 911 - 914
  • [5] A new distinguish attack against ABC stream cipher
    Falahati, Abolfazl
    Bagheri, Nasoor
    Naderi, Majid
    Mohajeri, Javad
    [J]. 9th International Conference on Advanced Communication Technology: Toward Network Innovation Beyond Evolution, Vols 1-3, 2007, : 1768 - 1770
  • [6] A new distinguishing and key recovery attack on NGG stream cipher
    Aleksandar Kircanski
    Rabeah Al-Zaidy
    Amr M. Youssef
    [J]. Cryptography and Communications, 2009, 1 : 269 - 282
  • [7] A new distinguishing and key recovery attack on NGG stream cipher
    Kircanski, Aleksandar
    Al-Zaidy, Rabeah
    Youssef, Amr M.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (02): : 269 - 282
  • [8] Improved Attack on WG Stream Cipher
    Mirzaei, Arash
    Dakhilalian, Mohammad
    Modarres-Hashemi, Mahmoud
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 45 - 52
  • [9] Differential Fault Attack on the Stream Cipher LIZARD
    MA Zhen
    TIAN Tian
    QI Wenfeng
    [J]. Chinese Journal of Electronics, 2021, 30 (03) : 534 - 541
  • [10] Differential Fault Attack on the Stream Cipher LIZARD
    Ma Zhen
    Tian Tian
    Qi Wenfeng
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 534 - 541